Untrusted users can inject malicious code into the canonical tag, which is then executed on the web page (front end).
Update to Contao 4.13.3.
Disable canonical tags in the root page settings.
https://contao.org/en/security-advisories/cross-site-scripting-via-canonical-url
If you have any questions or comments about this advisory, open an issue in contao/contao.
CPE | Name | Operator | Version |
---|---|---|---|
contao/contao | eq | 4.13.0 | |
contao/core-bundle | eq | 4.13.0 | |
contao/core-bundle | eq | 4.13.1 | |
contao/contao | eq | 4.13.2 | |
contao/contao | eq | 4.13.1 | |
contao/core-bundle | eq | 4.13.2 |
contao.org/en/security-advisories/cross-site-scripting-via-canonical-url.html
github.com/contao/contao
github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c
github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2
github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2022-24899.yaml
github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2022-24899.yaml
nvd.nist.gov/vuln/detail/CVE-2022-24899